The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why You Need Speed and Trust for Modern Software Delivery
Introduction
Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends:
Developer productivity is no longer only measured by speed, but quality and security as well
Many development teams rely on platform engineering to build tools ...

Is GenAI Outsmarting Us or Just Making Us Lazy?
Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game.
From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing ...

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe
Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024.
This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows ...
Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products
Turning Camera Surveillance on its Axis

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches
Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...

Unmasking Identity Risks Before They Become Breaches
An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.

Cyber-securing Enterprises, the AI Way
“...Therefore, send not to know
For whom the bell tolls,
It tolls for thee.”
John Donne, “No man is an island”
Introduction
No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses
As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or firewalls, but in the mindsets shaping our national response. Surprisingly, a solution to our cybersecurity maturity might not be in quantum encryption or artificial intelligence but ...
No results found.
In The News
Blue Connections IT Achieves Carbon Neutral Certification for The Third Consecutive Year
The best-in-class IT solutions provider continues to lead on emissions reduction and operational sustainability, achieving Climate Active Carbon Neutral certification for organisations in FY24
São Paulo Subway Selects Motorola Solutions Radio Communications to Enhance Safety for Millions of Staff And Passengers
The São Paulo Subway, one of Latin America's largest subway transportation operators, has implemented a new P25 land mobile radio (LMR) communication system from Motorola Solutions. This strategic investment, representing a major upgrade over the previous analogue system, is expected to significantly enhance operational efficiency and safety for the ...
Cancer Council Queensland Secures and Streamlines IT Infrastructure With Support From Macquarie Telecom
Macquarie Telecom and Cancer Council Queensland have signed an agreement to deliver a secure and connected technology foundation across Queensland, helping the state-wide charity simplify operations, cut costs, and keep its focus on supporting families when they need it most.
Cancer Council Queensland is the state’s leading non-government ...
Bitdefender Report: Malicious ‘TradingView Premium’ Ads Jump from Meta to Google and YouTube
Over the past year, Bitdefender researchers have been monitoring a persistent malicious campaign that initially spread via Facebook Ads, promising ‘free access’ to TradingView Premium and other trading or financial platforms.
According to researcher Alin Moloce at Bitdefender Labs, this campaign has now expanded beyond Meta platforms, infiltrating ...
Genetec Brings Audio Communications To Security Center SaaS
New feature integrates intercom support and SIP-based audio into unified platform to accelerate incident response and enhance situational awareness.
Tenable Analysis – Cisco Zero-day Vulnerabilities
Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign. The two flaws, CVE-2025-20333 and CVE-2025-20362, when combined or “chained” together, would give an attacker full control over the vulnerable ...
Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards
The recognition reflects Camelot Secure’s groundbreaking work advancing its Secure360 platform, which unifies cyber and physical security to meet the growing convergence challenge. Secure360 integrates AI, machine learning, and advanced threat intelligence to provide a proactive, holistic defense—helping enterprises and government clients protect ...
Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security
Launch of Darktrace / Forensic Acquisition & Investigation™, the industry’s first truly automated cloud forensics solution, can cut investigation times from days to minutes
The launch comes amid a widening cloud security gap, with nearly 90% of surveyed organisations across the US and UK reporting that they suffered damage before they could contain ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..